CISA 2022: Protecting Digital Assets

CISA    |    Expert
  • 14 videos | 1h 24m 46s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Digital asset protection is a key concern for the modern enterprise. As most organizations rely heavily on information systems in their day-to-day operations, protecting these valuable assets is of paramount importance. In this course, you'll learn about digital asset protection principles, beginning with organizational security policies, security and the OSI model, password security, and endpoint security. Then, you'll explore data loss prevention (DLP), Internet of Things (IoT) devices, IoT device vulnerability, and IoT security. Finally, you'll dig into mobile device access control, mobile device hardening, mobile device policies, and malicious app store apps. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how to align business needs with secured technological solutions
    Outline how to map security hardware and software to the open systems interconnection (osi) model
    Outline how to enable requirements for complex passwords and user account intruder detection
    Configure endpoint antimalware policy settings centrally using system center configuration manager (sccm)
    Outline how to determine when data loss prevention (dlp) solutions should be used for data privacy
    Recognize why internet of things (iot) devices are generally considered to be unsecure
  • Browse the shodan.io site to locate vulnerable iot devices
    Use techniques such as network isolation and changing default settings to harden iot devices
    Provide an overview of how to harden mobile device security
    Manually harden an android smartphone
    Configure microsoft sccm policies to ensure mobile device security compliance
    Identify how users can unwittingly install malicious apps on mobile devices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 15s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 29s
    After completing this video, you will be able to outline how to align business needs with secured technological solutions. FREE ACCESS
  • Locked
    3.  Security and the Open Systems Interconnection (OSI) Model
    13m 58s
    Upon completion of this video, you will be able to outline how to map security hardware and software to the Open Systems Interconnection (OSI) model. FREE ACCESS
  • Locked
    4.  Password Security
    7m 9s
    After completing this video, you will be able to outline how to enable requirements for complex passwords and user account intruder detection. FREE ACCESS
  • Locked
    5.  Configuring Endpoint Security
    6m 52s
    In this video, find out how to configure endpoint antimalware policy settings centrally using System Center Configuration Manager (SCCM). FREE ACCESS
  • Locked
    6.  Data Loss Prevention (DLP)
    4m 52s
    Upon completion of this video, you will be able to outline how to determine when data loss prevention (DLP) solutions should be used for data privacy. FREE ACCESS
  • Locked
    7.  Internet of Things (IoT) Devices
    4m 54s
    After completing this video, you will be able to recognize why Internet of Things (IoT) devices are generally considered to be unsecure. FREE ACCESS
  • Locked
    8.  Locating Vulnerable IoT Devices
    3m 54s
    In this video, discover how to browse the shodan.io site to locate vulnerable IoT devices. FREE ACCESS
  • Locked
    9.  Configuring IoT Security
    5m 31s
    Find out how to use techniques such as network isolation and changing default settings to harden IoT devices. FREE ACCESS
  • Locked
    10.  Mobile Device Access Control
    7m 14s
    Upon completion of this video, you will be able to provide an overview of how to harden mobile device security. FREE ACCESS
  • Locked
    11.  Hardening Mobile Devices
    6m 57s
    In this video, learn how to manually harden an Android smartphone. FREE ACCESS
  • Locked
    12.  Configuring Mobile Device Policies
    9m 26s
    During this video, you will learn how to configure Microsoft SCCM policies to ensure mobile device security compliance. FREE ACCESS
  • Locked
    13.  Malicious App Store Apps
    6m 14s
    After completing this video, you will be able to identify how users can unwittingly install malicious apps on mobile devices. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 1s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 364 users Rating 4.6 of 364 users (364)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)